Filtered by vendor Isc
Subscriptions
Filtered by product Bind
Subscriptions
Total
169 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-0400 | 1 Isc | 1 Bind | 2008-09-10 | N/A |
ISC BIND 9 before 9.2.1 allows remote attackers to cause a denial of service (shutdown) via a malformed DNS packet that triggers an error condition that is not properly handled when the rdataset parameter to the dns_message_findtype() function in message.c is not NULL, aka DoS_findtype. | ||||
CVE-2002-0029 | 2 Astaro, Isc | 2 Security Linux, Bind | 2008-09-10 | N/A |
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684. | ||||
CVE-2001-0013 | 1 Isc | 1 Bind | 2008-09-10 | N/A |
Format string vulnerability in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | ||||
CVE-2001-0012 | 1 Isc | 1 Bind | 2008-09-10 | N/A |
BIND 4 and BIND 8 allow remote attackers to access sensitive information such as environment variables. | ||||
CVE-2001-0011 | 1 Isc | 1 Bind | 2008-09-10 | N/A |
Buffer overflow in nslookupComplain function in BIND 4 allows remote attackers to gain root privileges. | ||||
CVE-2001-0010 | 1 Isc | 1 Bind | 2008-09-10 | N/A |
Buffer overflow in transaction signature (TSIG) handling code in BIND 8 allows remote attackers to gain root privileges. | ||||
CVE-2000-0335 | 2 Gnu, Isc | 2 Glibc, Bind | 2008-09-10 | N/A |
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results. | ||||
CVE-1999-0849 | 1 Isc | 1 Bind | 2008-09-09 | N/A |
Denial of service in BIND named via maxdname. | ||||
CVE-1999-1499 | 1 Isc | 1 Bind | 2008-09-05 | N/A |
named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used. |